IT Management  >   Systems Operations  >   Security  >   Network Security  >   Wireless Security  >  

PDA Security

RSS Feed    Add to Google    Add to My Yahoo!
PDA Security Reports
 
Android security settings and controls for Android enterprise security
sponsored by SearchSecurity.com
EGUIDE: With all the security gaps in the Android platform, is it possible to achieve enterprise-level security? In this resource, gain expert insight into enabling effective Android enterprise security. View now to explore Android security settings and control, battling Android malware, and much more.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

SearchSecurity.com

Weighing the Options for an Enterprise Mobility Strategy
sponsored by SearchSecurity.com
EGUIDE: In this E-Guide from SearchConsumerization.com, uncover the importance of an enterprise mobility strategy and learn more about the pros and cons of the top three options today: Mobile device management, mobile application management, and mobile information management.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

SearchSecurity.com

E-Guide: Identifying and addressing evolving threats
sponsored by SearchSecurity.com
EGUIDE: This expert resource offers key insight into the true definition of cyberthreats and uncovers 4 essential steps to consider when developing your IT security strategy for 2012.
Posted: 03 Feb 2012 | Published: 03 Feb 2012

SearchSecurity.com

Craft a security policy for a cloud-based BYOD environment
sponsored by IBM
TECHNICAL ARTICLE: As the bring your own device (BYOD) movement gains popularity in the workplace, new security concerns arise. In this article, learn how to create a thorough, clear security policy for a cloud-based BYOD environment that includes RIM, Android, Apple, and Windows devices.
Posted: 10 Jul 2014 | Published: 10 May 2013

IBM

How to add Mobile Devices to Enterprise PKI solutions
sponsored by OpenTrust
WHITE PAPER: Extending Public Key Infrastructure’s (PKI) certificate-based authentication to include mobile devices is the only way to restore the security of computing assets in the BYOD era. Read this whitepaper to learn how to add mobile devices to your Enterprise PKI solution.
Posted: 27 Jun 2013 | Published: 27 Jun 2013

OpenTrust

Bring Your Own Device (BYOD) Unleashed in the Age of IT Consumerization
sponsored by Bradford Networks
WHITE PAPER: With the proliferation of mobile devices and the consumerization of IT, corporate networks are becoming more challenging to manage and more at-risk every day. In this paper, explore this increasing issue, and how IT departments can implement a practical and secure strategy and offer the convenience and business agility that mobile devices provide.
Posted: 15 Dec 2011 | Published: 15 Dec 2011

Bradford Networks

Endpoint Protection Solutions: Why the Traditional Model is Broken
sponsored by Webroot
WHITE PAPER: Securing the enterprise may never have been a simple task, but now it is far more complex as hackers have become more creative and as the enterprise itself has extended into remote locations and as far as “the cloud.”
Posted: 10 Nov 2011 | Published: 10 Nov 2011

Webroot

Mobility & Security: Dazzling Opportunities, Profound Challenges – Carnegie Mellon CyLab
sponsored by Intel Security
WHITE PAPER: For this report, McAfee teamed up with Carnegie Mellon University to examine the current state of mobile security, some common problems and some recommendations that all businesses and consumers should consider.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

Intel Security

Mobile Device Security Lacking in Most Hospital Policy Discussions
sponsored by Essextec
EZINE: This expert resource from SearchHealthIT.com will attempt to uncover why conversations about mobile security have been lacking, discuss the emerging trends surrounding BYOD policies, and advise readers how to ensure security protocols are properly followed.
Posted: 11 Jun 2013 | Published: 11 Jun 2013

Essextec

Ponemon Global Study on Mobility Risks
sponsored by Websense, Inc.
WHITE PAPER: With the proliferation of mobile devices only progressing, it’s important fully to understand this trend to know how to build a robust security strategy to mitigate risks. This resource uncovers key findings based on a survey of 4,640 IT pros, exploring the major security issues of mobility and what they are doing to effectively address them.
Posted: 16 Apr 2012 | Published: 01 Feb 2012

Websense, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement